457 research outputs found

    Assessment of access to health services and vulnerabilities of female fish traders in the Kafue Flats, Zambia: analysis report

    Get PDF
    Under the regional programme Fisheries and HIV/AIDS in Africa: Investing in Sustainable Solutions, the WorldFish Center conducted this study on access to health services and vulnerabilities of female fish traders in the Kafue Flats floodplains in Zambia. This report outlines and analyses the particular vulnerabilities of female fish traders in the Kafue Flats fishery and formulates recommendations to facilitate stakeholder uptake of strategic responses to tackle the drivers of the epidemic in fishing communities and improve the livelihoods of fisher folk and fish traders in the Kafue Flats and other fisheries in Zambia. (pdf contains 55 pages

    Assessment of access to health services and vulnerabilities of female fish traders in the Kafue Flats, Zambia: analysis report

    Get PDF
    Under the regional programme Fisheries and HIV/AIDS in Africa: Investing in Sustainable Solutions, the WorldFish Center conducted this study on access to health services and vulnerabilities of female fish traders in the Kafue Flats floodplains in Zambia. This report outlines and analyses the particular vulnerabilities of female fish traders in the Kafue Flats fishery and formulates recommendations to facilitate stakeholder uptake of strategic responses to tackle the drivers of the epidemic in fishing communities and improve the livelihoods of fisher folk and fish traders in the Kafue Flats and other fisheries in Zambia.Women, Fishermen, Trade, Vulnerability, Viral diseases, Zambia,

    A Distributed Architecture for Spam Mitigation on 4G Mobile Networks

    Get PDF
    The 4G of mobile networks is considered a technology-opportunistic and user-centric system combining the economical and technological advantages of various transmission technologies. Part of its new architecture dubbed as the System Architecture Evolution, 4G mobile networks will implement an evolved packet core. Although this will provide various critical advantages, it will however expose telecom networks to serious IP-based attacks. One often adopted solution by the industry to mitigate such attacks is based on a centralized security architecture. This centralized approach nonetheless, requires large processing resources to handle huge amount of traffic, which results in a significant over dimensioning problem in the centralized nodes causing this approach to fail from achieving its security task.\\ In this thesis, we primarily contribute by highlighting on two Spam flooding attacks, namely RTP VoIP SPIT and SMTP SPAM and demonstrating, through simulations and comparisons, their feasibility and DoS impact on 4G mobile networks and subsequent effects on mobile network operators. We further contribute by proposing a distributed architecture on the mobile architecture that is secure by mitigating those attacks, efficient by solving the over dimensioning problem and cost-effective by utilizing `off the shelf' low-cost hardware in the distributed nodes. Through additional simulation and analysis, we reveal the viability and effectiveness of our approach

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Humanising policy from ‘Warriors to Guardians’: An evaluation of Coordinated Management and Emergency Response Assemblages in Ireland and the US

    Get PDF
    Coordinated Management and Emergency Response Assemblages (CMaERAs) are complex, multi-faceted, institutionalised networks of emergency response agencies, people, processes, technologies, histories, geographies and cultures which shape the strength of inter-agency coordination and emergency response. This thesis explores how a variety of actors, actants and technologies involved in emergency management assemble and organise. The methodology adopted is qualitative and uses two case studies to evaluate how CMaERA oscillate from their organised shape as dictated by policy to a new shape emanating from the needs of a response call. The case studies were: the Irish Emergency Management Assemblages (IEMA) response to the winter storms of 2015/2016 and the United States Emergency Management Assemblages (USEMA) response to the Boston Marathon Bombing in 2013. Fifty-one semi-structured interviews of key stakeholders and emergency response agents were conducted and supported by an interpretive analysis of key policy documents. By adopting assemblage theory and applying it to the empirical findings of the IEMA and USEMA, conceptualised within Foucauldian and Agambien understanding of power and sovereignty, this thesis offers a theoretical and philosophical framework to study emergency services, their interactions and power dynamics while keeping in sight their histories, cultures and current situations. This resulted in recognising that CMaERAs re-shape and oscillate position regularly to ensure that response is adequate and efficient. These movements are influenced both by the situation, inter-agency trust, and previous working relationships, but also from external factors, such as the institutionalisation and siloed manner of agencies, (in)formalisation, their relationship with the government, technological advancements, data analytics but also human nature. These broad factors affect inter-agency coordination and collaboration by creating barriers preventing the development of a true Coordinated Management and Emergency Response Assemblage. Finally, it provides three wider contributions to knowledge: expansion of the term ‘vulnerability’, development of embodied assemblages, and the identification of three urban factors which affect assemblage oscillation

    "Speaking with one voice": the Somali Retailers' Association - rights and xenophobia in Cape Town's townships

    Get PDF
    In the wake of extreme xenophobic violence, which swept South Africa in 2008, a group of Somali refugees resident in Cape Town formed the Somali Retailers’ Association (SRA) as a mutual support network made up of those who were targeted by xenophobes most: Somalis involved in informal sector trade in the townships. This study investigates the networks of targeted populations, analysing how this Association helps to mitigate the impact of xenophobia on the lives of its members

    Erkennung und Vermeidung von Fehlverhalten in fahrzeugbasierten DTNs

    Get PDF
    Delay- and Disruption-Tolerant Networks (DTNs) are a suitable technology for many applications when the network suffers from intermittent connections and significant delays. In current vehicular networks, due to the high mobility of vehicles, the connectivity in vehicular networks can be highly unstable, links may change or break soon after they have been established and the network topology varies significantly depending on time and location. When the density of networked vehicles is low, connectivity is intermittent and with only a few transmission opportunities. This makes forwarding packets very difficult. For the next years, until a high penetration of networked vehicles is realized, delay-tolerant methods are a necessity in vehicular networks, leading to Vehicular DTNs (VDTNs). By implementing a store-carry-forward paradigm, VDTNs can make sure that even under difficult conditions, the network can be used by applications. However, we cannot assume that all vehicles are altruistic in VDTNs. Attackers can penetrate the communication systems of vehicles trying their best to destroy the network. Especially if multiple attackers collude to disrupt the network, the characteristics of VDTNs, without continuous connectivity, make most traditional strategies of detecting attackers infeasible. Additionally, selfish nodes may be reluctant to cooperate considering their profit, and due to hard- or software errors some vehicles cannot send or forward data. Hence, efficient mechanisms to detect malicious nodes in VDTNs are imperative. In this thesis, two classes of Misbehavior Detection Systems (MDSs) are proposed to defend VDTNs against malicious nodes. Both MDSs use encounter records (ERs) as proof to document nodes' behavior during previous contacts. By collecting and securely exchanging ERs, depending on different strategies in different classes of MDSs, a reputation system is built in order to punish bad behavior while encouraging cooperative behavior in the network. With independently operating nodes and asynchronous exchange of observations through ERs, both systems are very well suited for VDTNs, where there will be no continuous, ubiquitous network in the foreseeable future. By evaluating our methods through extensive simulations using different DTN routing protocols and different realistic scenarios, we find that both MDS classes are able to efficiently protect the system with low overhead and prevent malicious nodes from further disrupting the network.In Netzwerken mit zeitweisen Unterbrechungen oder langen Verzögerungen sind Delay- and Disruption-Tolerant Networks (DTNs) eine geeignete Technologie für viele Anwendungen. Die Konnektivität in Fahrzeugnetzen ist bedingt durch die hohe Mobilität und die geringe Verbreitung von netzwerkfähigen Fahrzeugen oft instabil. Bis zur flächendeckenden Verbreitung von netzwerkfähigen Fahrzeugen ist es daher zwingend notwendig auf Methoden des Delay Tolerant Networking zurückzugreifen um die bestmögliche Kommunikation zu gewährleisten. In diesem Zusammenhang wird von Vehicular Delay Tolerant Networks (VDTNs) gesprochen. Durch das Store-Carry-Forward-Prinzip kann ein VDTN Kommunikation für Anwendungen ermöglichen. Allerdings ist davon auszugehen, dass sich nicht alle Fahrzeuge altruistisch verhalten: Angreifer können Fahrzeuge übernehmen und das Netzwerk attackieren oder Knoten sind aus egoistischen Motiven oder auf Grund von Defekten unkooperativ. Verfahren, die Fehlverhalten in stabilen Netzen durch direkte Beobachtung erkennen können, sind in VDTNs nicht anwendbar. Daher sind Methoden, die Fehlverhalten in VDTNs nachweisen können, zwingend erforderlich. In dieser Arbeit werden zwei Klassen von Misbehavior Detection Systems (MDSs) vorgestellt. Beide Systeme basieren auf Encounter Records (ERs): Nach einem Kontakt tauschen zwei Knoten kryptografisch signierte Meta-Informationen zu den erfolgten Datentransfers aus. Diese ERs dienen bei darauffolgenden Kontakten mit anderen Netzwerkteilnehmern als vertrauenswürdiger Nachweis für das Verhalten eines Knotens in der Vergangenheit. Basierend auf der Auswertung gesammelter ERs wird ein Reputationssystem entwickelt, das kooperatives Verhalten belohnt und unkooperatives Verhalten bestraft. Dauerhaft unkooperative Knoten werden aus dem Netzwerk ausgeschlossen. Durch den asynchronen Austausch von Informationen kann jeder Knoten das Verhalten seiner Nachbarn selbstständig und unabhängig evaluieren. Dadurch sind die vorgestellten MDS-Varianten sehr gut für den Einsatz in einem VDTN geeignet. Durch umfangreiche Evaluationen wird gezeigt, dass sich die entwickelten MDS-Verfahren für verschiedene Routingprotokolle und in unterschiedlichen Szenarien anwenden lassen. In allen Fällen ist das MDS in der Lage das System mit geringem Overhead gegen Angreifer zu verteidigen und eine hohe Servicequalität im Netzwerk zu gewährleisten
    corecore